Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20070157319 A1
Publication typeApplication
Application numberUS 11/634,371
Publication date5 Jul 2007
Filing date5 Dec 2006
Priority date18 Jan 2002
Also published asUS7591020, US20030140246
Publication number11634371, 634371, US 2007/0157319 A1, US 2007/157319 A1, US 20070157319 A1, US 20070157319A1, US 2007157319 A1, US 2007157319A1, US-A1-20070157319, US-A1-2007157319, US2007/0157319A1, US2007/157319A1, US20070157319 A1, US20070157319A1, US2007157319 A1, US2007157319A1
InventorsDavid Kammer, Raymond Combs
Original AssigneePalm, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Location based security modification system and method
US 20070157319 A1
Abstract
A method or system for providing a level of data security dependent on the location of the user of a wireless device is disclosed. One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The method is performed by determining the location of a network user node, selecting a single level of security from a group of more than two security levels based on the determined location, and modifying the security protection for the network user node based upon the selected level of security.
Images(4)
Previous page
Next page
Claims(20)
1. A method of adjusting security for a mobile computing device, comprising:
determining the location of the mobile computing device; and
configuring a security level for the mobile computing device at the mobile computing device, the security level being associated with the location.
2. The method of claim 1, further comprising restricting access to data stored on the mobile computing device based on the security level provided.
3. The method of claim 1, further comprising restricting access to functionality of the mobile computing device based on the security level provided.
4. The method of claim 1, wherein the mobile computing device comprises a handheld device.
5. The method of claim 1, wherein configuring the security level comprises requiring a password to access the data stored on the mobile computing device.
6. The method of claim 5, wherein the password is required after a predetermined period of time of non-use of the network user node.
7. The method of claim 6, wherein the predetermined period of time is dependent upon the location of the network user node.
8. The method of claim 7, wherein the predetermined period of time is received from a user of the network user node.
9. The method of claim 1, wherein configuring the security level comprises requiring a password to enable functionality of the mobile computing device.
10. A method of adjusting security for a mobile computing device, comprising:
determining the location of the mobile computing device; and
determining whether to require a password in order for a user to access data via the mobile computing device based upon the location of the mobile computing device.
11. The method of claim 10,
wherein determining whether to require the password in order for a user to access the data is further based upon the mobile computing device being idle for a period of time; and
wherein the period of time is a function of the location of the mobile computing device.
12. The method of claim 11, wherein the period of time is defined by a user of the mobile computing device.
13. The method of claim 11, wherein the data is stored on the mobile computing device.
14. The method of claim 9, wherein the mobile computing device is a handheld computing device.
15. A mobile computing device network user node, comprising:
a processor;
a location sensing system coupled to the processor; and
a memory coupled to the processor;
wherein the processor restricts access to data stored in the memory based upon location information provided to the processor by the location sensing system.
16. The mobile computing device of claim 15, further comprising:
a table of at least three security settings;
wherein the processor restricts access to the of data stored in the memory by selecting and applying one of the security settings based upon the location information.
17. The mobile computing device of claim 16, wherein the security settings are configurable by a user of the mobile computing device at the mobile computing device.
18. The mobile computing device of claim 16, wherein at least one security setting includes a password requirement to access the data stored in the memory.
19. The mobile computing device of claim 16, wherein at least one security setting includes restrictions on access to less than all of the data stored in the memory.
20. The mobile computing device of claim 15, wherein the mobile computing device is a handheld computing device.
Description
    CROSS-REFERENCE TO RELATED APPLICATIONS
  • [0001]
    This application is a continuation of application Ser. No. 10/053,013, filed Jan. 18, 2002, entitled “LOCATION BASED SECURITY MODIFICATION SYSTEM AND METHOD,” which is incorporated herein by reference in its entirety.
  • BACKGROUND
  • [0002]
    The disclosure relates generally to the field of wireless communication. More particularly, the disclosure relates to a method or system for providing a level of data security dependent on the location of the user of a wireless device.
  • [0003]
    Wireless networks, in general, have grown in both capability and use. More and more people rely on wireless devices in their professional and personal lives. Professionals often rely on wireless devices to have instant access to information while they are away from the office. Professionals use wireless devices to access email, calendars, contact lists, a company intranet, web-enabled applications, business and local news, and other information. Individuals often use wireless devices to stay in touch with friends and family and to access information which may aid them in their daily activities.
  • [0004]
    As people use wireless networks more, they are also more frequently storing and accessing sensitive data on portable devices and/or over wireless networks. This information can include personal information, financial information, or company confidential information. The information can either be stored on the remote portable device or it can be stored on a server and accessed using the remote portable device over a wireless network. Both the device and the transmission can be susceptible to interference, interception, or tampering.
  • [0005]
    A wide number of various techniques have evolved to try and protect the data that is stored on handheld devices and transmitted over wireless networks. Examples of the techniques include: authentication, authorization, encryption, and data integrity verification. Authentication refers to verification of the identity of a person or process from which a message, data request, or access request originates. Authorization refers to the process of determining what functionality or access to information is available to that particular person or process. Encryption refers to encoding information in such a manner such that the information is not decipherable by someone intercepting the information. Data integrity attempts to ensure that the data has not been modified or damaged during a transmission.
  • [0006]
    Unfortunately, providing security has costs associated with it. Generally in a network, data is sent in discrete units called “packets”. Packets of data are generally required to be of fixed size by most current network protocols. If the data is being transmitted from a remote location, security information may be required on every packet sent and received from a handheld device. This allows less space for data in each individual packet. Thus, filling packets with security information has the effect of reducing the effective transmission rate. This reduction is especially noticeable on a wireless network where the transmission rates are already vastly slower compared to a wired network.
  • [0007]
    Even if data is not being sent over a remote network, providing security has costs. Authentication and authorization can require the user to enter a password every time the data needs to be accessed. The data will remain unlocked for a period of time, but security can require that the data be locked again after a period of time or on the happening of an event such as shutting off the handheld device. Encryption requires that the data be organized such that it is not normally readable. Unfortunately, this process takes time, and prior to accessing the information, the data must be decrypted. And then again, after the access is complete, the data must be re-encrypted.
  • [0008]
    Albeit security is important to protect information, especially sensitive information such as credit card numbers, financial information, or corporate proprietary information, however, the absolute highest level of security is not necessary at all times. For example, when in a shopping mall, it may be useful to be able to access personalized shopping information with only minimal security. Also, while the user is at the office, there may be no reason to provide heavy security for company proprietary information.
  • [0009]
    Accordingly, there is a need for a method or system for providing different levels of security for different subsets of data based on the location of a portable network node or portable electronic device. There is also an increased need to protect the data transmissions and the devices from any or all of interference, interception, and or tampering.
  • [0010]
    It would be desirable to provide a system and/or method that provides one or more of these or other advantageous features. Other features and advantages will be made apparent from the present specification. The teachings disclosed extend to those embodiments which fall within the scope of the appended claims, regardless of whether they accomplish one or more of the aforementioned needs.
  • SUMMARY OF THE INVENTION
  • [0011]
    One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The method is performed by determining the location of a network user node, selecting a single level of security from a group of more than two security levels based on the determined location, and modifying the security protection for the network user node based upon the selected level of security.
  • [0012]
    Another exemplary embodiment relates to a computer system for modifying security settings for a network user node based on the location of the node. The computer system includes a location sensing device having a communicative coupling with the system for determining the location of a network user node, a storage device for storing a table of security modifications to be performed according to one of a plurality of locations for the network user node, the security modifications including more than two levels, a processor coupled to a storage device for processing information, storing the information on a storage device, and generating a security modification instruction, and a communication device capable of transmitting a data signal to the network user node containing instructions to modify the security protection for the node.
  • [0013]
    Another exemplary embodiment relates to a method of adjusting security for a network user node having a processor, a memory coupled to the processor, a wireless transceiver, and a location determining device in communication with a network based upon the location of the node. The method includes receiving location information using a network user node, and using the network user node to modify security protection for data to a single level from a group of more than two levels based upon the location information.
  • [0014]
    Another exemplary embodiment relates to a system implemented on a network user node for modifying security settings based on the location of the node. The system includes a system for determining the location of the network user node coupled to the network user node, a processor for processing information, storing information on a storage device, and accessing a table of security modification instructions, the table including more than two unique security modifications, and a storage device coupled to the network user node for storing a table of security modifications to be performed based on a plurality of locations for the network user node. Alternative exemplary embodiments relate to other features and combination of features as may be generally recited in the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0015]
    The invention is illustrated by way of example and not limitation using the figures of the accompanying drawings, in which the references indicate similar elements and in which:
  • [0016]
    FIG. 1A is a general block diagram of a network user node in communication with a wireless network in accordance with an exemplary embodiment;
  • [0017]
    FIG. 1B is a general block diagram of a network user node with an associated location sensor system in accordance with an exemplary embodiment;
  • [0018]
    FIG. 1C is a general block diagram of a network user node in communication over a wireless network using wireless access points;
  • [0019]
    FIG. 2 is a flow diagram illustrating a process of using the location of a network user node to set security levels;
  • [0020]
    FIG. 3A is an exemplary embodiment of a table showing security level settings indexed by location;
  • [0021]
    FIG. 3B is an exemplary embodiment of a record stored in the table shown in FIG. 3A.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • [0022]
    A system and method for using location information to change security settings for a mobile network node is described. In the following description, for purposes of explanation, numerous specific details are set forth to provide a through understanding of exemplary embodiments of the invention. It will be evident, however, to one skilled in the art that the invention may be practiced without these specific details. In other instances, structures and devices are shown in block diagram form to facilitate description of the exemplary embodiments.
  • [0023]
    FIG. 1A is a general block diagram 100 of a network user node 110 (or multiple network user nodes 110) in communication over a wireless network 120 with a remote computing system 130 in accordance with an exemplary embodiment. In an exemplary embodiment, remote computing system 130 is associated with a location sensing system 140.
  • [0024]
    Network user node 110 can be a handheld computer, a handheld personal digital assistant, a laptop computer, a wireless cellular digital phone, a pager, or any other such device. Network user node 110 can be communicatively coupled to a wired or wireless network 120.
  • [0025]
    In an exemplary embodiment wireless network 120 is the Internet. In alternative embodiments, wireless network 120 is any type of network such as, a virtual private network, an intranet, an Ethernet, or a netware network. Further, wireless network 120 can include a configuration, such as, a wireless network, a wide area network (WAN) or a local area network (LAN).
  • [0026]
    Remote computing system 130 can be any computing system including a central processing unit (CPU), a storage device, and a communication system. Remote computing system 130 can be communicatively coupled to location sensing system 140. The communication between remote computing system 130 and location sensing system 140 can be achieved over a standard wired network, a wireless network, or any other communication system.
  • [0027]
    Location sensing system 140 can include a global positioning satellite system (GPS), an access node triangulation system, an access point sensing system, or any other system capable of detecting the location of network user node 110. Location sensing system 140 includes a communication system to transmit the location information to remote computing system 130.
  • [0028]
    FIG. 1B is a general block diagram 101 of network user node 110 with associated location sensor system 140 in accordance with an exemplary embodiment. Diagram 101 illustrates an alternative embodiment, wherein network user node 110 is directly associated with location sensing system 140. In an exemplary embodiment location sensing system 140 is a GPS system. Location sensing system 140 can be any system capable of determining location and sending a data signal containing that information to network user node 110.
  • [0029]
    FIG. 1C is a general block diagram 102 of a network user node 110 in communication over wireless network 120 with wireless access point 150 and wireless access point 155. Wireless access points 150 and 155 may be but are not limited to IEEE 802.11 wireless access points, Bluetooth wireless access points, etc. Network user node 110 is in communication with wireless access points 150 and 155 over communications network 110. Network user node 110 can obtain location information based upon the location of the wireless access point that is being accessed over wireless network 110. In an exemplary embodiment, network user node 110 can receive timing information sent from wireless access point 150 to calculate the distance between the network user node 110 and wireless access point 150. Network user node 110 can perform the same process with wireless access point 155. Based upon stored location information and the distance from the two wireless access points, the location of network user node 110 can be determined. Alternatively location could be determined by determining the distance and direction of a signal received from just one of wireless access points 150 and 155. In a further alternative, a gross approximation of network user node 110 may be determined by using the known location of the access point 150 with which user node 110 can communicate.
  • [0030]
    Examples have been illustrated above for some exemplary embodiments for determining the location of network user node 110. These embodiments are shown for illustrative purposes only. Any method wherein the location of network user node 110 is determined with greater or lessor specificity is contemplated.
  • [0031]
    FIG. 2 illustrates a flow diagram 200 illustrating an exemplary embodiment of a method of using location information to update security settings on network user node 110.
  • [0032]
    In a step 210, the location of network user node 110 is obtained from location sensing system 140 or using wireless access points or an alternative location detection system. The network user node's location can be obtained using global positioning satellite (GPS) signals, information regarding the location of the current access point for the network user node, a signal triangulation method, or any other method capable of detecting the location of a network user node with greater or lesser specificity.
  • [0033]
    In a step 220 the location information is verified. If the location either could not be determined or is found to be an unacceptable value, network user node 110 could be configured to display a notice to this effect and apply default security settings for network user node 110 in a step 222. Following the application of the default security levels, step 210 is once again performed and an attempt to determine the location of network user node 110 is once again made. Alternatively, step 210 can be performed after an interval of time has passed or upon the occurrence of some event such as powering on network user node 110 or attempting to access new functionality or data.
  • [0034]
    If the location value is properly determined and is an acceptable value in step 220, a step 224 is performed wherein the location is referenced in a table 300 of security settings indexed by location, described below in reference to FIG. 3A. Table 300 can be stored on a storage apparatus in association either with remote computer system 130 in communication with network user node 110 over wireless network 120 or on a storage apparatus associated with network user node 110. Table 300 can be implemented using a processor and a storage means to create and store a series of records or a linked list. Alternatively table 300 can be implemented using a database or any other suitable method wherein information can be stored, indexed, and easily retrieved.
  • [0035]
    A determination is made in a step 230 to determine if the current location of network user node 110 is stored in table 300 of security settings indexed according to location. If the location is not found, an optional step 240 can be performed.
  • [0036]
    In step 240, a new record 350 described below in reference to FIG. 3B, can be created for storage in table 300. In step 240 the user is queried to determine if they want to create new record 350 containing security settings for the location determined in step 210. In one exemplary embodiment the user can be queried using a display associated with network user node 110. In an alternative embodiment the user can be queried using a series of communications sent from remote computing system 130 over wireless network 120 to network user node 110. The query would give the user location information and the user would have the option of setting at least one security level setting for that location from a set of more than two different security levels (i.e. the level of security is chosen from more than just security on or security off). The security level setting could include restrictions or complete blocks on access to either network user node 110 as a whole, information stored on the network user node 110, or any subset of information stored on the network user node 110. The security setting could also include restrictions or blocks on access to information available on a remote system accessible using network user node 110 over wireless network 120.
  • [0037]
    If the user does wish to create new record 350, a step 242 is performed wherein the information is gathered through the user interface of the network user node 110 and used to populate a new record 350 with an index based on the location information determined in step 210. In an exemplary embodiment, the user could have the option of expanding or shrinking the location setting to define the complete space wherein the new security settings should apply. Following the entry of the record information, a step 244 is performed wherein new record 350 is stored in table 300.
  • [0038]
    If the user does not wish to create new record 350 in step 240, the system will apply default security levels in a step 222. Following application of the default security levels the system and method will return to step 210 to once again determine the location of network user node 110. Alternatively, step 210 can be performed after an interval of time has passed or upon the occurrence of some event such as powering on network user node 110 or attempting to access new functionality or data.
  • [0039]
    If location was determined in step 220 and found in the table in step 230, an optional step 250 may be performed wherein instructions to update the security settings for network user node 110 are transmitted from remote computing system 130 over wireless network 120 to network user node 110. In alternative embodiments, illustrated above in reference to FIGS. 1B and 1C, this step is not required.
  • [0040]
    After the proper security instructions are obtained, a step 260 is performed wherein the security settings for network user node 110 are modified according to the information stored in the record. Following the update of the security settings, a step 210 is once again performed to determine the location of network user node 110. Step 210 can be performed immediately to create a continuous looping and updating of the security levels for network user node 110 based upon location, or alternatively the security settings can be updated after certain intervals of time, or the security settings can be updated upon the occurrence of some event such as a powering on of network user node 110 or attempting to access new data or functionality.
  • [0041]
    FIG. 3A shows an exemplary embodiment of a table 300 for storing information regarding security settings for network user node 110 indexed according to location. This table can be stored on remote computing system 130. Alternative, table 300 can be stored on a storage apparatus associated with network user node 0.
  • [0042]
    Each entry in table 300 is represented by a record, described in detail below with reference to FIG. 3B. Table 300 represents a complete listing of all records that are stored on the storage system.
  • [0043]
    In addition to user defined records based upon location, table 300 stores a record 310 for default security settings. Record 310 is referenced in step 222, described above in reference to FIG. 2, to apply security settings when either the location is unknown or the location is known but not represent by a record in table 300. In an alternative embodiment, one record can be used when location is undetermined, while another can be used when location is not represented by a record stored in table 300.
  • [0044]
    FIG. 3B represents new record 350 for storing security level information to be associated with a location. Record 350 may contain several entry fields for storing information relevant to security level settings for any one particular location. In an exemplary embodiment record 350 contains entry fields for the name of the location, the coordinates of the location, the security settings for the network user node at that location, the default security settings for that location, the security settings for a subset of information at that setting and any other security information that the user may wish to associate with a given location. The location information stored in new record 350 can be a single point or a range wherein the security settings will apply.
  • [0045]
    While the detailed drawings, specific examples and particular formulations given describe exemplary embodiments, they serve the purpose of illustration only. The hardware and software configurations shown and described may differ depending on the chosen performance characteristics and physical characteristics of the computing devices. For example, the type of computing device, data structures, or devices used may differ. The systems and methods shown and described are not limited to the precise details and conditions disclosed. Furthermore, other substitutions, modifications, changes, and omissions may be made in the design, operating conditions, and arrangement of the exemplary embodiments and the steps of the exemplary embodiments without departing from the scope of the invention as expressed in the appended claims.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4956769 *16 May 198811 Sep 1990Sysmith, Inc.Occurence and value based security system for computer databases
US5010547 *10 Jul 198923 Apr 1991Motorola, Inc.Multiple messaging using a single selective call address
US5012219 *13 Oct 198930 Apr 1991Motorola, Inc.Message reminder alert for selective call receiver
US5075684 *6 Oct 198924 Dec 1991Motorola, Inc.Selective call message management
US5359317 *9 Oct 199225 Oct 1994Motorola, Inc.Method and apparatus for selectively storing a portion of a received message in a selective call receiver
US5394140 *23 Nov 199228 Feb 1995Motorola, Inc.Method and apparatus for pre-programmed call-back-number-determined alert
US5430436 *22 Jul 19944 Jul 1995Motorola, Inc.Method and apparatus for displaying a keypad arrangement on a selective call receiver
US5561836 *2 May 19941 Oct 1996Motorola, Inc.Method and apparatus for qualifying access to communication system services based on subscriber unit location
US5612682 *30 May 199518 Mar 1997Motorola, Inc.Method and apparatus for controlling utilization of a process added to a portable communication device
US5640452 *28 Apr 199517 Jun 1997Trimble Navigation LimitedLocation-sensitive decryption of an encrypted message
US5650776 *8 May 199522 Jul 1997Motorola, Inc.Communication receiver having user configuration control functions
US5705995 *7 Apr 19976 Jan 1998Motorola, Inc.Selective call receiver and method of storing messages therein
US5809413 *19 Dec 199615 Sep 1998Nokia Mobile Phones LimitedOver the air locking of user identity modules for mobile telephones
US5898783 *14 Nov 199627 Apr 1999Lucent Technologies, Inc.System and method for employing a telecommunications network to remotely disable a SIM or smartcard
US5903852 *10 Sep 199611 May 1999Motorola, Inc.Radiotelephone operating technique
US5922073 *27 Dec 199613 Jul 1999Canon Kabushiki KaishaSystem and method for controlling access to subject data using location data associated with the subject data and a requesting device
US5930801 *30 Oct 199727 Jul 1999Xerox CorporationShared-data environment in which each file has independent security properties
US5958006 *19 Dec 199528 Sep 1999Motorola, Inc.Method and apparatus for communicating summarized data
US5961590 *22 Jul 19975 Oct 1999Roampage, Inc.System and method for synchronizing electronic mail between a client site and a central site
US5968131 *26 Oct 199819 Oct 1999Roampage, Inc.System and method for securely synchronizing multiple copies of a workspace element in a network
US5991405 *27 Jan 199823 Nov 1999Dsc Telecom, L.P.Method for dynamically updating cellular phone unique encryption keys
US6023708 *29 May 19978 Feb 2000Visto CorporationSystem and method for using a global translator to synchronize workspace elements across a network
US6084968 *29 Oct 19974 Jul 2000Motorola, Inc.Security token and method for wireless applications
US6085192 *11 Apr 19974 Jul 2000Roampage, Inc.System and method for securely synchronizing multiple copies of a workspace element in a network
US6130947 *31 Dec 199710 Oct 2000Mizobe; TatsujiMethod of configuring access and security code
US6131096 *5 Oct 199810 Oct 2000Visto CorporationSystem and method for updating a remote database in a network
US6131116 *13 Dec 199610 Oct 2000Visto CorporationSystem and method for globally accessing computer services
US6151606 *16 Jan 199821 Nov 2000Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6157630 *26 Jan 19985 Dec 2000Motorola, Inc.Communications system with radio device and server
US6202070 *31 Dec 199713 Mar 2001Compaq Computer CorporationComputer manufacturing system architecture with enhanced software distribution functions
US6208991 *26 Aug 199827 Mar 2001International Business Machines CorporationDynamic file mapping for network computers
US6233341 *19 May 199815 May 2001Visto CorporationSystem and method for installing and using a temporary certificate at a remote site
US6246376 *28 Jun 200012 Jun 2001Texas Instruments IncorporatedWireless location and direction indicator for multiple devices
US6269456 *11 Jan 200031 Jul 2001Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6308273 *12 Jun 199823 Oct 2001Microsoft CorporationMethod and system of security location discrimination
US6327584 *30 Jul 19994 Dec 2001Hewlett-Packard CompanyApparatus and method for using version control to dynamically update files while the files are available for access
US6360252 *31 Aug 200019 Mar 2002Fusionone, Inc.Managing the transfer of e-mail attachments to rendering devices other than an original e-mail recipient
US6366912 *6 Apr 19982 Apr 2002Microsoft CorporationNetwork security zones
US6370629 *29 Oct 19989 Apr 2002Datum, Inc.Controlling access to stored information based on geographical location and date and time
US6504480 *9 Aug 20017 Jan 2003Hewlett-Packard CompanyElectronic device security
US6587684 *28 Jul 19981 Jul 2003Bell Atlantic Nynex MobileDigital wireless telephone system for downloading software to a digital telephone using wireless data link protocol
US6636175 *14 Sep 200121 Oct 2003Paul Grady RussellMethod and apparatus for acquiring a remote position
US6650902 *15 Nov 199918 Nov 2003Lucent Technologies Inc.Method and apparatus for wireless telecommunications system that provides location-based information delivery to a wireless mobile unit
US6651171 *6 Apr 199918 Nov 2003Microsoft CorporationSecure execution of program code
US6662023 *6 Jul 20009 Dec 2003Nokia Mobile Phones Ltd.Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US6671757 *26 Jan 200030 Dec 2003Fusionone, Inc.Data transfer and synchronization system
US6677858 *30 May 200013 Jan 2004Reveo, Inc.Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object along a course through the space-time continuum
US6694336 *25 Jan 200017 Feb 2004Fusionone, Inc.Data transfer and synchronization system
US6708221 *20 Sep 200016 Mar 2004Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US6732176 *18 Apr 20004 May 2004Wayport, Inc.Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure
US6738789 *2 Jan 200118 May 2004Fusionone, Inc.Data package including synchronization data
US6757696 *2 Jan 200129 Jun 2004Fusionone, Inc.Management server for synchronization system
US6766454 *23 Jul 199720 Jul 2004Visto CorporationSystem and method for using an authentication applet to identify and authenticate a user in a computer network
US6778837 *22 Mar 200117 Aug 2004International Business Machines CorporationSystem and method for providing access to mobile devices based on positional data
US6801777 *27 Nov 20015 Oct 2004Intel CorporationDevice and method for intelligent wireless communication selection
US6804669 *14 Aug 200112 Oct 2004International Business Machines CorporationMethods and apparatus for user-centered class supervision
US6813503 *31 Aug 20002 Nov 2004Nokia CorporationWireless communication terminal for accessing location information from a server
US6842695 *17 Apr 200111 Jan 2005Fusionone, Inc.Mapping and addressing system for a secure remote access system
US6892225 *19 Jul 200010 May 2005Fusionone, Inc.Agent system for a secure remote access system
US6898628 *22 Mar 200124 May 2005International Business Machines CorporationSystem and method for providing positional authentication for client-server systems
US6925476 *17 Aug 20002 Aug 2005Fusionone, Inc.Updating application data including adding first change log to aggreagate change log comprising summary of changes
US6931130 *7 Oct 199916 Aug 2005International Business Machines CorporationDynamically adjustable software encryption
US6934767 *19 Sep 200023 Aug 2005Fusionone, Inc.Automatically expanding abbreviated character substrings
US6944651 *17 May 200113 Sep 2005Fusionone, Inc.Single click synchronization of data from a public information store to a private information store
US6970927 *6 Nov 200029 Nov 2005Wayport, Inc.Distributed network communication system which provides different network access features
US7003668 *2 Nov 200121 Feb 2006Fusionone, Inc.Secure authentication of users via intermediate parties
US7007041 *2 Jan 200128 Feb 2006Fusionone, Inc.Synchronization system application object interface
US7020772 *22 Sep 200328 Mar 2006Microsoft CorporationSecure execution of program code
US7035878 *17 Aug 200025 Apr 2006Fusionone, Inc.Base rolling engine for data transfer and synchronization system
US7039679 *19 Dec 20032 May 2006Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US7051196 *5 Dec 200123 May 2006Hewlett-Packard Development Company, L.P.Location-based security for a portable computer
US7080402 *12 Mar 200118 Jul 2006International Business Machines CorporationAccess to applications of an electronic processing device solely based on geographic location
US7116977 *19 Dec 20003 Oct 2006Bellsouth Intellectual Property CorporationSystem and method for using location information to execute an action
US7159120 *19 Nov 20012 Jan 2007Good Technology, Inc.Method and system for protecting data within portable electronic devices
US7239346 *18 Oct 19993 Jul 2007Priddy Dennis GSystem and architecture that supports a multi-function semiconductor device between networks and portable wireless communications products
US7272848 *13 Feb 200218 Sep 2007Network Appliance, Inc.Method for device security in a heterogeneous storage network environment
US7343165 *11 Apr 200111 Mar 2008American Calcar Inc.GPS publication application server
US7591020 *18 Jan 200215 Sep 2009Palm, Inc.Location based security modification system and method
US7603435 *15 Nov 200613 Oct 2009Palm, Inc.Over-the-air device kill pill and lock
US20010013098 *29 Aug 19979 Aug 2001Michael F. AngeloRemote security technology
US20020023010 *20 Mar 200121 Feb 2002Rittmaster Ted R.System and process for distribution of information on a communication network
US20020138632 *22 Mar 200126 Sep 2002International Business Machines CorporationSystem and method for providing positional authentication for client-server systems
US20020176579 *24 May 200128 Nov 2002Deshpande Nikhil M.Location-based services using wireless hotspot technology
US20030061166 *29 Jan 200227 Mar 2003Masahiro SaitoSecurity management apparatus, security management method, and security management program
US20030079218 *12 Apr 200224 Apr 2003Massachusetts Institute Of TechnologyRemote collaborative control and direction
US20030097586 *19 Nov 200122 May 2003Mok Steven Siong CheakSecurity system
US20030140246 *18 Jan 200224 Jul 2003Palm, Inc.Location based security modification system and method
US20030157947 *8 Jan 200321 Aug 2003Fiatal Trevor A.Connection architecture for a mobile network
US20040003266 *20 Mar 20031 Jan 2004Patchlink CorporationNon-invasive automatic offsite patch fingerprinting and updating system and method
US20040044791 *22 May 20014 Mar 2004Pouzzner Daniel G.Internationalized domain name system with iterative conversion
US20050102257 *7 Nov 200312 May 2005Onyon Richard M.Personal information space management system and method
US20050191998 *27 Feb 20041 Sep 2005Onyon Richard M.Wireless telephone data backup system
US20060059253 *29 Sep 200516 Mar 2006Accenture Llp.Architectures for netcentric computing systems
US20060084410 *19 Oct 200520 Apr 2006Jay SutariaFlexible billing architecture
US20060149794 *8 Dec 20056 Jul 2006Seven Networks International OyDatabase synchronization
US20060184591 *28 Dec 200517 Aug 2006Seven Networks International OyDatabase synchronization via a mobile network
US20070101426 *31 Aug 20063 May 2007Samsung Electronics Co., Ltd.Device function restricting method and system in specific perimeters
US20070238443 *7 Apr 200611 Oct 2007Richardson Roger DMethod and device for restricted access contact information datum
US20080115152 *15 Nov 200615 May 2008Bharat WelingkarServer-controlled heartbeats
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US808669524 Sep 200927 Dec 2011Hewlett-Packard Development Company, L.P.Over the air services for mobile devices
US813579815 Nov 200613 Mar 2012Hewlett-Packard Development Company, L.P.Over-the-air device services and management
US890394512 Dec 20112 Dec 2014Qualcomm IncorporatedOver the air services for mobile devices
US9424408 *21 Dec 200923 Aug 2016Qualcomm IncorporatedUtilizing location information to minimize user interaction required for authentication on a device
US20080114855 *15 Nov 200615 May 2008Bharat WelingkarOver-the-air device services and management
US20100122324 *24 Sep 200913 May 2010Palm, Inc.Over the air services for mobile devices
US20110154434 *21 Dec 200923 Jun 2011Palm, Inc.Utilizing Location Information to Minimize User Interaction Required for Authentication on a Device
US20140157401 *26 Dec 20125 Jun 2014Motorola Mobility LlcMethod of Dynamically Adjusting an Authentication Sensor
USRE4307010 Oct 20063 Jan 2012Hewlett-Packard Development Company, L.P.Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server
WO2016133624A1 *18 Jan 201625 Aug 2016Intel CorporationMethods and apparatus to process data based on automatically detecting a security environment
Classifications
U.S. Classification726/27
International ClassificationG06F21/62, H04L29/06, H04L9/32
Cooperative ClassificationH04L63/105, G06F2221/2113, G06F2221/2111, G06F21/6218, H04L63/107
European ClassificationH04L63/10E, G06F21/62B, H04L63/10D
Legal Events
DateCodeEventDescription
8 Mar 2007ASAssignment
Owner name: PALM, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAMMER, DAVID;COMBS, RAY;REEL/FRAME:019016/0984;SIGNING DATES FROM 20020109 TO 20020117
9 Jan 2008ASAssignment
Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNOR:PALM, INC.;REEL/FRAME:020341/0285
Effective date: 20071219
Owner name: JPMORGAN CHASE BANK, N.A.,NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNOR:PALM, INC.;REEL/FRAME:020341/0285
Effective date: 20071219
6 Jul 2010ASAssignment
Owner name: PALM, INC., CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:024630/0474
Effective date: 20100701
28 Oct 2010ASAssignment
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:025204/0809
Effective date: 20101027